I. NETWORK MANAGEMENT INTRODUCTION
A. The need for network management
B. Ingredients for successful network management
-Fault monitoring
-Performance monitoring
-Security
C. Trend analysis
D. Network Management cost justification
-Network Management budget
-Cost analysis
E. In-band network management
F. Out-of-band network management
II. SNMP OVERVIEW
A. SNMP and its relationship with TCP/IP
B. RFC review
C. Life before SNMP
-ICMP
-PING
D. SNMP components
-Management station, Management agent, Management Information Base
(MIB)
-Network management protocol
E. SNMP Polling
F. SNMP messages
-Get, Get-Next, Get-Response, Trap
G. Proxy agents
III. SNMP MANAGEMENT INFORMATION BASE (MIB)
A. Purpose of MIB
B. Structure of Management Information (SMI)
-Abstract Syntax Notation 1 (ASN.1)
C. Defining an ASN.1 OBJECT-TYPE macro
D. MIB I and MIB II
E. MIB groupings
F. Private MIBs
G. The accuracy of SNMP
IV. REMOTE NETWORK MONITORING (RMON)
A. RMON defined
-Extension of MIB-2
-Interface for communicating to remote
B. monitors via SNMP
C. Location of RMON
D. RMON design goals
E. RMON configuration and table management
F. Multiple managers
G. RMON MIB groups analyzed
H. Integrating RMON into hubs, routers and switches
V. NETWORK MANAGEMENT PROTOCOLS
A. Review of TCP/IP protocols
-TCP, IP, ICMP (ARP, RARP, BOOTP)
B. SNMP Community String
-Authentication Service
-Access Policy
C. SNMP encapsulated with User Datagram Protocol (UDP)
D. SNMP Message Structure
-Get, Get-Next, Get-Response, Trap
E. SNMP Polling
F. Limitations of SNMP
G. SNMP Structure Details
-Bit Encoding Rules (BER)
-Type, Length and Value (TLV) Construction
VI. SNMPv2
A. Origins and history
B. SNMPv2 Enhancements
-Manager to manager capability
-Greater security
-More operational capability
C. Differences between SNMP and SNMPv2
D. Migrating to SNMPv2
E. SNMP Management Systems
F. SNMP platforms
G. Extending SNMP to the desktop
H. SNMP in an SNA environment
I. Expert systems
VII. OSPF HISTORY
A. Reasons and needs for OSPF
VIII. OSPF THEORY AND OPERATIONS
A. OSPF Operations
- Distance Vector Protocol vs Link State Protocols.
- Distance Vector Protocols in large scale implementations.
B. Router IDs
C. Components
D. Packet Types
- OSPF Update process
- Designated Router
E. Link State Advertisements
- Types of Link State Advertisements (LSAs)
F. SPF Algorithm reviewed
IX. OSPF CONFIGURATION - SINGLE AREA
A. IOS configuration statements
X. SHOW AND DEBUG COMMANDS
A. OSPF show and debug commands explained
XI. OSPF AUTHENTICATION
A. Area authentication is discussed and implemented
XII. OSPF WAN AREA TYPES
A. WAN connectivity, Broadcast and a Non-Broadcast Multiple Access network.
XIII. OSPF OPERATION IN MULTIPLE AREAS
A. VLSM
B. Router Types
C. Area Types
D. Standard areas, Stub Areas, Not-So-Stubby Areas, and the Backbone
- Inter-area LSAs
E. Type 3 and Type 4 LSAs
F. Configuring Multiple Area OSPF
G. Route summarization
H. OSPF areas
I. Virtual links
J. OSPF dial-up considerations
K. OSPF timers